Lantronix SLC 8000 Advanced Console Manager User Guide - Page 143

V3 User Read-Write, V3 User Trap, Version 3 TLS (over TCP), that receives the traps

Page 143 highlights

7: Services V3 User Read-Write User Name SNMP v3 is secure and requires user-based authorization to access SLC MIB objects. Enter a user ID for users with read-write authority. The default is snmprwuser. Up to 20 characters. Password/ Password for the user with read-write authority to use to access SNMP v3. The default Retype Password is SNMPRWPASS. Up to 20 characters. Passphrase/ Retype Passphrase Passphrase associated with the password for a user with read-write authority. Up to 20 characters. If this is not specified it will default to the v3 Read-Write Password. V3 User Trap User Name SNMP v3 is secure and requires user-based authorization to access SLC unit MIB objects. Enter a user ID for users with authority to send traps. The default is snmptrapuser. Up to 20 characters. Password/ Password for the user with authority to send v3 traps. The default is Retype Password SNMPTRAPPASS. Up to 20 characters. Passphrase/ Retype Passphrase Passphrase associated with the password for a user with authority to send v3 traps. Up to 20 characters. If this is not specified it will default to the v3 Trap Password. 3. To save, click the Apply button. Version 3 TLS (over TCP) SNMP v3 over TLS requires three X.509 certificate files for authenticating the SLC SNMP agent with a client or tool that queries the agent for information. SNMP v3 also requires two X.509 certificate files for authenticating the SLC client application that issues traps with the NMS application that receives traps. The certificates required for the modes are:  For authenticating an SLC agent with a client or tool that queries the agent: the certificate authority (or root) file, certificate file, and private key file are required.  For authenticating an SLC client application that issues traps with the NMS application that receives the traps: certificate authority (or root) file and client (or trap) certificate file are required. If the SLC is used in both the modes, the agent certificate file and client (or trap) certificate file must share the same the certificate authority (or root) file. All certificate files should be in PEM format, e.g.: -----BEGIN CERTIFICATE----(certificate in base64 encoding) -----END CERTIFICATE----- Certificate fingerprints may be required by applications interfacing the SNMP applications of SLC when TLS is used. SLC will display the SHA1 and SHA256 fingerprint of the certificate authority and certificate files when they are uploaded into SLC. The fingerprint of the client certificate must also be configured when authenticating the SLC agent with a client or tool that queries the agent. For information about generating a certificate authority (or root) file, agent (or server) certificate and key, and client certificate and key with OpenSSL, see Creating a Certificate. We recommend you to set the message digest used when creating the certificates to SHA1 or SHA256, depending on the level of security required. When SLC is in FIPS mode, only certificates with a message digest of SHA256 or higher are allowed. To set the message digest used by OpenSSL, in step (1b) SLC™ 8000 Advanced Console Manager User Guide 143

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472

7: Services
SLC™ 8000 Advanced Console Manager User Guide
143
V3 User Read-Write
V3 User Trap
3.
To save, click the
Apply
button.
Version 3 TLS (over TCP)
SNMP v3 over TLS requires three X.509 certificate files for authenticating the SLC SNMP agent
with a client or tool that queries the agent for information. SNMP v3 also requires two X.509
certificate files for authenticating the SLC client application that issues traps with the NMS
application that receives traps. The certificates required for the modes are:
For authenticating an SLC agent with a client or tool that queries the agent:
the
certificate authority (or root) file, certificate file, and private key file are required.
For authenticating an SLC client application that issues traps with the NMS application
that receives the traps:
certificate authority (or root) file and client (or trap) certificate file are
required.
If the SLC is used in both the modes, the agent certificate file and client (or trap) certificate file
must share the same the certificate authority (or root) file. All certificate files should be in PEM
format, e.g.:
-----BEGIN CERTIFICATE-----
(certificate in base64 encoding)
-----END CERTIFICATE-----
Certificate fingerprints may be required by applications interfacing the SNMP applications of SLC
when TLS is used. SLC will display the SHA1 and SHA256 fingerprint of the certificate authority
and certificate files when they are uploaded into SLC. The fingerprint of the client certificate must
also be configured when authenticating the SLC agent with a client or tool that queries the agent.
For information about generating a certificate authority (or root) file, agent (or server) certificate
and key, and client certificate and key with OpenSSL, see
Creating a Certificate
. We recommend
you to set the message digest used when creating the certificates to SHA1 or SHA256, depending
on the level of security required. When SLC is in FIPS mode, only certificates with a message
digest of SHA256 or higher are allowed. To set the message digest used by OpenSSL, in step (1b)
User Name
SNMP v3 is secure and requires user-based authorization to access
SLC
MIB objects.
Enter a user ID for users with read-write authority. The default is
snmprwuser
. Up to
20 characters.
Password/
Retype Password
Password for the user with read-write authority to use to access SNMP v3. The default
is
SNMPRWPASS
. Up to 20 characters.
Passphrase/
Retype
Passphrase
Passphrase associated with the password for a user with read-write authority. Up to 20
characters. If this is not specified it will default to the v3 Read-Write Password.
User Name
SNMP v3 is secure and requires user-based authorization to access SLC unit MIB
objects. Enter a user ID for users with authority to send traps. The default is
snmptrapuser
. Up to 20 characters.
Password/
Retype Password
Password for the user with authority to send v3 traps. The default is
SNMPTRAPPASS
. Up to 20 characters.
Passphrase/
Retype
Passphrase
Passphrase associated with the password for a user with authority to send v3 traps. Up
to 20 characters. If this is not specified it will default to the v3 Trap Password.